|
|
|
|
|
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition
There are two kinds of cryptography in this world: cryptography that will stop your kid sister from
reading your files, and cryptography that will stop major governments from reading your files. This
book is about the latter.
If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the... | | Cloud Security: A Comprehensive Guide to Secure Cloud Computing
Well-known security experts decipher the most challenging aspect of cloud computing-security
Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access... | | |
|
Digital Privacy and Security Using Windows: A Practical Guide
Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques.
This book teaches you how to secure your online identity and personal... | | Building Mobile Apps at Scale: 39 Engineering Challenges
While there is a lot of appreciation for backend and distributed systems challenges, there tends to be less empathy for why mobile development is hard when done at scale.
This book collects challenges engineers face when building iOS and Android apps at scale, and common ways to tackle these. By scale, we mean having ... | | Practical Studies in E-Government: Best Practices from Around the World
Information and communication technology (ICT) is permeating all aspects of service management; in the public sector, ICT is improving the capacity of government agencies to provide a wide array of innovative services that benefit citizens. E-Government is emerging as a multidisciplinary field of research based initially on empirical insights... |
|
How Personal & Internet Security Works (How It Works)In 2003, fraud and identity theft cost consumers at least $437 million dollars. In 2004, the U.S. Federal Trade Commission received 247,000 consumer complaints in 2004 (up 15% from 2003), from individuals whose identity was stolen, and according to Reuters.com (2/2005), Americans lost $548 million dollars to identity theft... | | Spatial Data on the Web: Modeling and ManagementSpatial data is essential in a wide range of application domains today. While geographical applications remain the key target area, spatial properties are required in other contexts such as computer-aided design, robotics and image processing. Associated with these is the constantly growing number of distributed processing architectures, based on,... | | Engaging Privacy and Information Technology in a Digital AgePrivacy is a growing concern in the United States and around the world. The spread of the Internet and the seemingly unbounded options for collecting, saving, sharing, and comparing information trigger consumer worries; online practices of businesses and government agencies present new ways to compromise privacy; and e-commerce and technologies... |
|
|
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 |